SOCRadar® Cyber Intelligence Inc. | The
Ağu 10, 2023
The "Downfall" Effect: Intel CPUs May Leak Sensitive Information

The “Downfall” Effect: Intel CPUs May Leak Sensitive Information On August 9, Intel and the discoverer of the vulnerability, Daniel Moghimi, unveiled a fresh exploit named Downfall. This n...

Learn More
SOCRadar® Cyber Intelligence Inc. | EvilProxy Account Takeover Campaign Targets Key Executives
Ağu 10, 2023
EvilProxy Account Takeover Campaign Targets Key Executives

EvilProxy Account Takeover Campaign Targets Key Executives An escalating threat, named EvilProxy, combines advanced Adversary-in-the-Middle (AitM) phishing with sophisticated Account Takeover (AT...

Learn More
SOCRadar® Cyber Intelligence Inc. | SOCRadar Unveils 'Treemium': Report a Bug, Plant a Future with SOCRadar
Ağu 09, 2023
SOCRadar Unveils 'Treemium': Report a Bug, Plant a Future with SOCRada...

SOCRadar Unveils ‘Treemium’: Report a Bug, Plant a Future with SOCRadar We are overjoyed to pull back the curtain on a new initiative from SOCRadar – Treemium! This new initiative, rooted ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Microsoft’s August 2023 Patch Tuesday Fixes Six Critical Vulnerabilities and Two Exploited Zero-Days
Ağu 09, 2023
Microsoft’s August 2023 Patch Tuesday Fixes Six Critical Vulnerabiliti...

Microsoft’s August 2023 Patch Tuesday Fixes Six Critical Vulnerabilities and Two Exploited Zero-Days Microsoft’s August 2023 Patch Tuesday has just arrived. The update addresses a total of 74 vulnerab...

Learn More
SOCRadar® Cyber Intelligence Inc. | Complex RCE Vulnerability (CVE-2023-39143) in PaperCut Application Servers
Ağu 07, 2023
Complex RCE Vulnerability (CVE-2023-39143) in PaperCut Application Ser...

Complex RCE Vulnerability (CVE-2023-39143) in PaperCut Application Servers PaperCut NG and PaperCut MF are extensively utilized software solutions for print management servers. CVE-2023-39143 refers t...

Learn More
SOCRadar® Cyber Intelligence Inc. | Critical Microsoft Power Platform Vulnerability: Proactive Security Methods to Prevent Exploitation
Ağu 07, 2023
Critical Microsoft Power Platform Vulnerability: Proactive Security Me...

Critical Microsoft Power Platform Vulnerability: Proactive Security Methods to Prevent Exploitation Microsoft fixed a critical vulnerability in its Power Platform after facing criticism for the delaye...

Learn More
SOCRadar® Cyber Intelligence Inc. | Threat Actors Employ New Phishing Tactic Using Google AMP
Ağu 04, 2023
Threat Actors Employ New Phishing Tactic Using Google AMP

Threat Actors Employ New Phishing Tactic Using Google AMP Researchers have uncovered a highly effective phishing tactic, which utilizes Google AMP (Accelerated Mobile Pages). Google AMP is an open-sou...

Learn More
SOCRadar® Cyber Intelligence Inc. | Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your System
Ağu 03, 2023
Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your...

Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your System [Update] January 10, 2024: “Countering Living Off the Land (LOTL) Attack Methods with AI and ML” ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Ransomware Demands
Ağu 02, 2023
Top 10 Ransomware Demands

Top 10 Ransomware Demands In cyberspace, few threats rival ransomware attacks’ pervasive and destructive nature. As our interconnected world grows, these digital extortionists demonstrate unpara...

Learn More
SOCRadar® Cyber Intelligence Inc. | P2Pinfect: A Worm-Like Botnet Malware Targeting Redis Deployments
Ağu 01, 2023
P2Pinfect: A Worm-Like Botnet Malware Targeting Redis Deployments

P2Pinfect: A Worm-Like Botnet Malware Targeting Redis Deployments Researchers have identified an unknown group of hackers employing a novel strain of malware named “P2Pinfect” to target pu...

Learn More
SOCRadar® Cyber Intelligence Inc. | DepositFiles Config File Exposes Multiple Databases: Users’ Privacy at Risk
Tem 31, 2023
DepositFiles Config File Exposes Multiple Databases: Users’ Privacy at...

DepositFiles Config File Exposes Multiple Databases: Users’ Privacy at Risk DepositFiles, a well-known web hosting service, left its environment configuration file publicly accessible, leading to unau...

Learn More
SOCRadar® Cyber Intelligence Inc. | Android Vulnerabilities That Do Not Get Fixed Function as a Zero-Day
Tem 31, 2023
Android Vulnerabilities That Do Not Get Fixed Function as a Zero-Day

Android Vulnerabilities That Do Not Get Fixed Function as a Zero-Day Maddie Stone of Google’s Threat Analysis Group (TAG) authored the fourth annual year-in-review of zero-day vulnerabilities that att...

Learn More
SOCRadar® Cyber Intelligence Inc. | Collective Security in Cyberspace with NATO
Tem 28, 2023
Collective Security in Cyberspace with NATO

Collective Security in Cyberspace with NATO The North Atlantic Treaty Organization (NATO) is an intergovernmental military alliance formed to ensure collective defense and security for its member nati...

Learn More
SOCRadar® Cyber Intelligence Inc. | New Advanced Attack Technique Exploiting “search-ms” URI Protocol Handler
Tem 28, 2023
New Advanced Attack Technique Exploiting “search-ms” URI Protocol Hand...

New Advanced Attack Technique Exploiting “search-ms” URI Protocol Handler The Windows operating system boasts a robust search feature for locating files and folders; there also is a less-known element...

Learn More
SOCRadar® Cyber Intelligence Inc. | Nitrogen: A Malware Campaign Leveraging Search Ads
Tem 27, 2023
Nitrogen: A Malware Campaign Leveraging Search Ads

Nitrogen: A Malware Campaign Leveraging Search Ads Researchers have uncovered a new initial access malware campaign dubbed “Nitrogen”. This campaign employs Google and Bing search ads to promote fake ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Phishing Risks of Twitter's Name Change to X
Tem 26, 2023
The Phishing Risks of Twitter's Name Change to X

The Phishing Risks of Twitter’s Name Change to X In today’s digital playground, social media swings both ways, offering a fun-filled space for individuals to connect and share, while also ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Russia-Linked APT Group Gamaredon Starting Extortion 30-50 Minutes After First Initial Access
Tem 26, 2023
Russia-Linked APT Group Gamaredon Starting Extortion 30-50 Minutes Aft...

Russia-Linked APT Group Gamaredon Starting Extortion 30-50 Minutes After First Initial Access The threat group, Gamaredon, linked to Russia, has been observed engaging in data exfiltration activities ...

Learn More
SOCRadar® Cyber Intelligence Inc. | VMware Responses to the Critical CVE-2023-20891 Vulnerability Exposing CF API Admin Credentials
Tem 25, 2023
VMware Responses to the Critical CVE-2023-20891 Vulnerability Exposing...

VMware Responses to the Critical CVE-2023-20891 Vulnerability Exposing CF API Admin Credentials Virtual machines have revolutionized the world of cybersecurity, offering a myriad of benefits to cybers...

Learn More
SOCRadar® Cyber Intelligence Inc. | RCE Vulnerability in OpenSSH’s SSH-Agent Forwarding: CVE-2023-38408
Tem 25, 2023
RCE Vulnerability in OpenSSH’s SSH-Agent Forwarding: CVE-2023-38408

RCE Vulnerability in OpenSSH’s SSH-Agent Forwarding: CVE-2023-38408 SSH-Agent is a widely used program that holds private keys for public key authentication, providing a secure and convenient way to l...

Learn More
SOCRadar® Cyber Intelligence Inc. | Critical Zero-Day in Ivanti EPMM (Formerly MobileIron Core) Is Actively Exploited (CVE-2023-35078)
Tem 25, 2023
Critical Zero-Day in Ivanti EPMM (Formerly MobileIron Core) Is Activel...

Critical Zero-Day in Ivanti EPMM (Formerly MobileIron Core) Is Actively Exploited (CVE-2023-35078) Ivanti, a U.S. IT software company, has resolved an actively exploited zero-day authentication bypass...

Learn More